Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Threats to Payroll Data: How Can Your Firm Manage Them?

In modern, connected workplaces, security is a perpetual concern. Some departments in your organization handle high-risk information, such as personal employee data and company finances. Any data breach can bring on a reputational crisis and endanger internal strategic approaches. In February 2025, HR Dive reported the impact of a data breach at an employee screening services provider. The breach affected an unnerving 3.3 million people, leaking people's names and financial account information. Social Security numbers and other ID numbers also got compromised.
Featured Post

How Much Service Do You Need from DRaaS?

All Disaster-Recovery-as-a-Service (DRaaS) providers do the same basic thing: They manage the recovery of data and applications following an outage or cyberattack. The growing frequency of cyber-attacks highlights the importance of these services. Cloudflare, for example, mitigated $6.9 million DDoS attacks in Q4 2024, a 16% increase quarter-over-quarter and an 83% rise year-over-year.

Security for AI: enabling secure AI adoption across the enterprise

AI is transforming productivity across every industry—from marketing and design to legal and engineering. But while employees rush to embrace tools like ChatGPT, Gemini, and Microsoft Copilot, many are using other tools without oversight from IT or security. As this grassroots usage grows, so does the volume—and sensitivity—of data flowing into AI tools.

The Role of Data Transfer Monitoring with DLP in Tracking Internal & External Data Movement

Data Loss Prevention (DLP) tools are crucial for protecting sensitive information as it moves within and outside an organization. They help prevent data leaks and unauthorized access by allowing organizations to monitor, control, and respond to potential data transfer risks. In this article, let’s learn more about how DLP tools play a vital role in secure data transfers.

Yet Another NodeJS Backdoor (YaNB): A Modern Challenge

During an Advanced Continual Threat Hunt (ACTH) investigation conducted in early March 2025, Trustwave SpiderLabs identified a notable resurgence in malicious campaigns exploiting deceptive CAPTCHA verifications. These campaigns trick users into executing NodeJS-based backdoors, subsequently deploying sophisticated NodeJS Remote Access Trojans (RATs) similar to traditional PE structured legacy RATs.

AI and Compliance with Adam Winston

This week on the podcast, we bring in Adam Winston, former CSO of ActZero and current Field CTO for Managed Services at WatchGuard to discuss automating the SOC with AI. We cover the history of AI in SecOps, the good and bad applications of AI and Machine Learning, what the future looks like, and how compliance might impact our ability to get there.

Cyberhaven Spring 2025 Product Launch

AI Took Off. We’re Launching the Controls. Discover how Cyberhaven is rewriting the rules of AI data security. Our newest innovation is too big to call a feature — it’s a new frontier. AI changed everything... fast. Productivity soared, but so did risk. Employees embraced AI, and data raced across tools without oversight. The question isn’t if your organization is using AI — it’s how much risk it’s exposing in the process.